Back to Home
graphlit icon

graphlit-mcp-server

Verified Safe

by graphlit

Overview

The Model Context Protocol (MCP) Server integrates with the Graphlit Platform to provide an LLM-enabled knowledge API, enabling ingestion, search, retrieval, RAG, and publishing of content from various data connectors for MCP clients.

Installation

Run Command
npx -y graphlit-mcp-server

Environment Variables

  • GRAPHLIT_ENVIRONMENT_ID
  • GRAPHLIT_ORGANIZATION_ID
  • GRAPHLIT_JWT_SECRET
  • NOTION_API_KEY
  • DROPBOX_APP_KEY
  • DROPBOX_APP_SECRET
  • DROPBOX_REFRESH_TOKEN
  • BOX_CLIENT_ID
  • BOX_CLIENT_SECRET
  • BOX_REDIRECT_URI
  • BOX_REFRESH_TOKEN
  • DISCORD_BOT_TOKEN
  • GOOGLE_CLIENT_ID
  • GOOGLE_CLIENT_SECRET
  • GOOGLE_REFRESH_TOKEN
  • MICROSOFT_CLIENT_ID
  • MICROSOFT_CLIENT_SECRET
  • MICROSOFT_REFRESH_TOKEN
  • LINEAR_API_KEY
  • SLACK_BOT_TOKEN
  • SHAREPOINT_ACCOUNT_NAME
  • SHAREPOINT_CLIENT_ID
  • SHAREPOINT_CLIENT_SECRET
  • SHAREPOINT_REFRESH_TOKEN
  • ONEDRIVE_CLIENT_ID
  • ONEDRIVE_CLIENT_SECRET
  • ONEDRIVE_REFRESH_TOKEN
  • GOOGLE_DRIVE_SERVICE_ACCOUNT_JSON
  • GOOGLE_DRIVE_CLIENT_ID
  • GOOGLE_DRIVE_CLIENT_SECRET
  • GOOGLE_DRIVE_REFRESH_TOKEN
  • GITHUB_PERSONAL_ACCESS_TOKEN
  • TWITTER_TOKEN
  • GOOGLE_EMAIL_CLIENT_ID
  • GOOGLE_EMAIL_CLIENT_SECRET
  • GOOGLE_EMAIL_REFRESH_TOKEN
  • MICROSOFT_EMAIL_CLIENT_ID
  • MICROSOFT_EMAIL_CLIENT_SECRET
  • MICROSOFT_EMAIL_REFRESH_TOKEN
  • JIRA_EMAIL
  • JIRA_TOKEN
  • TWITTER_CONSUMER_API_KEY
  • TWITTER_CONSUMER_API_SECRET
  • TWITTER_ACCESS_TOKEN_KEY
  • TWITTER_ACCESS_TOKEN_SECRET
  • FROM_EMAIL_ADDRESS

Security Notes

The server primarily relies on environment variables for sensitive credentials (Graphlit API keys, various connector tokens, etc.), which is good practice. The server uses a StdioServerTransport, meaning it communicates over standard I/O rather than opening a network port, reducing external attack surface. However, the 'ingestFile' tool uses 'fs.readFileSync' which could pose a risk if the 'filePath' parameter is controlled by an untrusted or malicious MCP client, potentially allowing arbitrary file reads from the server's filesystem. This risk is mitigated by the implied trusted relationship with MCP clients in the typical deployment model.

Similar Servers

Stats

Interest Score79
Security Score8
Cost ClassHigh
Avg Tokens10000
Stars367
Forks49
Last Update2025-12-05

Tags

GraphlitLLMAIRAGData IngestionKnowledge BaseMCPAgent Tools